Search the dblp DataBase
Juan M. Estévez-Tapiador :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Esther Palomar , Juan M. Estévez-Tapiador , Julio César Hernández Castro , Arturo Ribagorda A Protocol for Secure Content Distribution in Pure P2P Networks. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2006, pp:712-716 [Conf ] Almudena Alcaide , Juan M. Estévez-Tapiador , Julio César Hernández Castro , Arturo Ribagorda An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:396-408 [Conf ] Esther Palomar , Juan M. Estévez-Tapiador , Julio César Hernández Castro , Arturo Ribagorda A P2P Content Authentication Protocol Based on Byzantine Agreement. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:60-72 [Conf ] Esther Palomar , Juan M. Estévez-Tapiador , Julio César Hernández Castro , Arturo Ribagorda Security in P2P Networks: Survey and Research Directions. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2006, pp:183-192 [Conf ] Almudena Alcaide , Juan M. Estévez-Tapiador , Antonio Izquierdo , José María Sierra A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2005, pp:1309-1318 [Conf ] Juan M. Estévez-Tapiador , Pedro Garcia-Teodoro , Jesús E. Díaz-Verdejo N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:841-850 [Conf ] Antonio Izquierdo Manzanares , Joaquín Torres Márquez , Juan M. Estévez-Tapiador , Julio César Hernández Castro Attacks on Port Knocking Authentication Mechanism. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2005, pp:1292-1300 [Conf ] Pedro Peris-Lopez , Julio César Hernández Castro , Juan M. Estévez-Tapiador , Arturo Ribagorda RFID Systems: A Survey on Security Threats and Proposed Solutions. [Citation Graph (0, 0)][DBLP ] PWC, 2006, pp:159-170 [Conf ] Juan M. Estévez-Tapiador , Pedro Garcia-Teodoro , Jesús E. Díaz-Verdejo Detection of Web-Based Attacks through Markovian Protocol Parsing. [Citation Graph (0, 0)][DBLP ] ISCC, 2005, pp:457-462 [Conf ] Gabriel Maciá-Fernández , Jesús E. Díaz-Verdejo , Juan M. Estévez-Tapiador PIM-DM Cost Analysis in Loop Free Topologies. [Citation Graph (0, 0)][DBLP ] ISCC, 2005, pp:719-723 [Conf ] Juan M. Estévez-Tapiador , Pedro Garcia-Teodoro , Jesús E. Díaz-Verdejo Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] IWIA, 2003, pp:3-12 [Conf ] Pedro Peris-Lopez , Julio César Hernández Castro , Juan M. Estévez-Tapiador , Arturo Ribagorda EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:352-361 [Conf ] Esther Palomar , Juan M. Estévez-Tapiador , Julio César Hernández Castro , Arturo Ribagorda Certificate-based Access Control in Pure P2P Networks. [Citation Graph (0, 0)][DBLP ] Peer-to-Peer Computing, 2006, pp:177-184 [Conf ] Carlos Lamenca-Martinez , Julio César Hernández Castro , Juan M. Estévez-Tapiador , Arturo Ribagorda Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. [Citation Graph (0, 0)][DBLP ] PPSN, 2006, pp:850-859 [Conf ] Pedro Peris-Lopez , Julio César Hernández Castro , Juan M. Estévez-Tapiador , Arturo Ribagorda M2 AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:912-923 [Conf ] Juan M. Estévez-Tapiador , Pedro Garcia-Teodoro , Jesús E. Díaz-Verdejo NSDF: a computer network system description framework and its application to network security. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:43, n:5, pp:573-600 [Journal ] Juan M. Estévez-Tapiador , Pedro Garcia-Teodoro , Jesús E. Díaz-Verdejo Measuring normality in HTTP traffic for anomaly-based intrusion detection. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:45, n:2, pp:175-193 [Journal ] Juan M. Estévez-Tapiador , Pedro Garcia-Teodoro , Jesús E. Díaz-Verdejo Anomaly detection methods in wired networks: a survey and taxonomy. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2004, v:27, n:16, pp:1569-1584 [Journal ] Julio César Hernández Castro , Ignacio Blasco-Lopez , Juan M. Estévez-Tapiador , Arturo Ribagorda Garnacho Steganography in games: A general methodology and its application to the game of Go. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:1, pp:64-71 [Journal ] Juan M. Estévez-Tapiador Moving Web Services to the Secure Side. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2004, v:5, n:1, pp:- [Journal ] Juan M. Estévez-Tapiador Concepts and Attitudes for Internet Security (A review of Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin). [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2003, v:4, n:10, pp:- [Journal ] Juan M. Estévez-Tapiador The Emergence of Cyber-Terrorism. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2004, v:5, n:10, pp:- [Journal ] Juan M. Estévez-Tapiador Book Review: Practical Intrusion Prevention. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2006, v:7, n:6, pp:- [Journal ] Esther Palomar , Juan M. Estévez-Tapiador , Julio César Hernández Castro , Arturo Ribagorda Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2007, pp:779-783 [Conf ] Almudena Alcaide , Juan M. Estévez-Tapiador , Julio César Hernández Castro , Arturo Ribagorda A Multi-party Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2007, pp:42-43 [Conf ] Esther Palomar , Almudena Alcaide , Juan M. Estévez-Tapiador , Julio César Hernández Castro Bayesian Analysis of Secure P2P Sharing Protocols. [Citation Graph (0, 0)][DBLP ] OTM Conferences (2), 2007, pp:1701-1717 [Conf ] An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. [Citation Graph (, )][DBLP ] Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming. [Citation Graph (, )][DBLP ] On the Salsa20 Core Function. [Citation Graph (, )][DBLP ] Towards Automated Design of Multi-party Rational Exchange Security Protocols. [Citation Graph (, )][DBLP ] Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. [Citation Graph (, )][DBLP ] Nature-Inspired Synthesis of Rational Protocols. [Citation Graph (, )][DBLP ] Steganalysis of Hydan. [Citation Graph (, )][DBLP ] CSteg: Talking in C Code - Steganography of C Source Code in Text. [Citation Graph (, )][DBLP ] Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. [Citation Graph (, )][DBLP ] Heuristic search for non-linear cryptanalytic approximations. [Citation Graph (, )][DBLP ] Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. [Citation Graph (, )][DBLP ] Secure content access and replication in pure P2P networks. [Citation Graph (, )][DBLP ] Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations [Citation Graph (, )][DBLP ] Cryptanalysis of the RSA-CEGD protocol [Citation Graph (, )][DBLP ] Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks [Citation Graph (, )][DBLP ] Security Flaws in a Recent Ultralightweight RFID Protocol [Citation Graph (, )][DBLP ] Search in 0.021secs, Finished in 0.024secs